ThreatConnect
![ThreatConnect whitepaper](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093443/ThreatConnect-Whitepaper-400x200.jpg)
Whitepaper: Make smarter decisions by using orchestration with intelligence
Analysts in security teams make decisions all day in their investigations that impact the security of the entire organization: Where should I look next? What should I do about …
ThreatConnect named winner of the SOAR Platform of the Year award
ThreatConnect, provider of the industry’s only intelligence-driven security operations platform, announced that it has been named the winner of the “Overall Security …
![ThreatConnect SOAR Platforms](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093556/threatconnect-soar-400x200.jpg)
Free SOAR Platforms eBook
A SOAR platform represents an evolution in security operations driven by the vast amounts of data that must be processed. Working off a single platform is critical to …
![ebook threat intelligence platforms](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093615/ebook_threat_intelligence_platforms-400x200.jpg)
Free eBook: Threat intelligence platforms
Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus …
![ThreatConnect](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093101/threatconnect-400x200.jpg)
ThreatConnect Platform: Security insight for sound decision-making
In this interview, Jason Spies, VP of Engineering & Chief Architect, ThreatConnect, talks about the powerful features of the ThreatConnect Platform. Oftentimes, the …
ThreatConnect and RSA to provide users with intelligence-driven SOAR
ThreatConnect, provider of the industry’s only intelligence-driven security operations platform is proud to announce a new partnership with RSA to offer the ThreatConnect …
![ThreatConnect whitepaper](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093443/ThreatConnect-Whitepaper-400x200.jpg)
Whitepaper: Security Orchestration with Threat Intelligence
Understand how you can make smarter decisions to move faster — both blocking an adversary and disrupting them altogether — by using orchestration with intelligence. This …
ThreatConnect users can now access data from Flashpoint
ThreatConnect, provider of the industry’s only intelligence-driven security operations platform, announced its updated integration with Flashpoint, the leader in Business Risk …
![ThreatConnect SOAR Platforms](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093556/threatconnect-soar-400x200.jpg)
Free eBook: SOAR Platforms
A SOAR platform represents an evolution in security operations driven by the vast amounts of data that must be processed. Even for the most skilled team, keeping up with the …
![ebook threat intelligence platforms](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093615/ebook_threat_intelligence_platforms-400x200.jpg)
eBook – Threat intelligence platforms: Everything you’ve ever wanted to know
Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095321/data-400x200.jpg)
Whitepaper – Threat Intelligence Platforms: Open Source vs. Commercial
As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware …
ThreatConnect added to the approved product list of the DHS CDM Program
ThreatConnect, provider of the industry’s only intelligence-driven security operations platform, is proud to announce that it has been added to the Department of Homeland …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD